Answer:
there is no pedestrians and everyone is stopped at their designated red light
A situation that might create a problem for a website’s security is known o be as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.
Others are;
- Lack of authentication in company security.
- Access control-linked misconfigurations.
- A Software misconfigurations.
<h3>What could a back-end developer do to prevent this situation from occurring?</h3>
- Always Encrypt sensitive data:
- Do not use weak encryption algorithm.
The back end in cyber security is know to be a sort of a kind of a repository of all that entails your web presence and also that of your mobile apps and it is one that makes it to run smoothly.
Hence, A situation that might create a problem for a website’s security is known o be as a result of Outside people having access to a companies website and documents and also hackers hacking into a company database.
Learn more about website’s security from
brainly.com/question/10450768
#SPJ1
Bus de datos:Bus de dirección:Bus de control.
<u>The various systems on a network and develop a logging policy based on the information in the aforementioned sections:</u>
Cisco is router, which is physical device appliance where placed in LAN OR WAN for connecting workstation or desktop or laptop of other offices in organization.
It is a security device and purpose to make organization to access or connected to end use of other networks.
Basically there routers are used ISDN LINE, LEASE LINE or VPN for connecting varies WAN
Purpose of keeping the logging polices to do further analysis how the network packets or traffic is executed and passed different tcpip address. If case any hackers or packet loss the network administrator will do further analysis and protect the system form packet loss or from hackers. Keeping network logs is policy driven. So network administrator keeps logs for no. of days.
Some network administration export log and keep as reference.
SQL injection. This is usually cause by the programmer not making the program parse incoming text, therefore allowing an attacker to input database commands.